Originally, Java was used to create similar apps as what other language?
Perl
Python
CSS
Javascript

Answers

Answer 1

Answer:

Python

Explanation:

Took the test

Answer 2

Originally, Java was used to create similar apps as other languages, which as python. The correct option is b.

What are computer languages?

The computer languages are Java and Python is in their conversion; the Java compiler converts Java source code into an intermediate code known as bytecode, whereas the Python interpreter converts Python source code into machine code line by line.

Curly braces are used in Java to define the beginning and end of each function and class definition, whereas indentation is used in Python to separate code into separate blocks.

Multiple inheritances is done partially through interfaces in Java, whereas Python continues to support both solitary and multiple inheritances.

Therefore, the correct option is b. Python.

To learn more about computer languages, refer to the below link:

https://brainly.com/question/14523217

#SPJ2


Related Questions

a good look of a web page depends upon?​

Answers

Answer: See explanation

Explanation:

• Font size: The font size used matters a lot in order to enhance readability. The ideal font size should be 16 pixel for the main body text. This is vital in order to help enhance readability. It should be noted that a don't size that is lower or higher than that can lead to challenges with readability.

• Graphics and animation: Using of exciting graphics and animations on a website can help in giving the web page a good look, help in grabbing the attention of the user, and also increase engagement.

• Use of colours: The color chosen also helps to give a web page a good look. It should be noted that when choosing colors, it is ideal to choose two or at most three colors to use for a web page. Mixing different colors or using very bright colors is typically a turn off.

Handoff points in cross-functional flowcharts are of particular importance to process analysis.A. True B. False

Answers

Answer:

True

Explanation:

If an app asks for a user's age, it may be because the app requires a user to be over a certain age to use some of the services it provides. Write a function called checkAge that takes one parameter of type String. The function should try to convert this parameter into an Int value and then check if the user is over 18 years old. If he/she is old enough, print "Welcome!", otherwise print "Sorry, but you aren't old enough to use our app." If the String parameter cannot be converted into an Int value, print "Sorry, something went wrong. Can you please re-enter your age?" Call the function and pass in userInputAge below as the single parameter. Then call the function and pass in a string that can be converted to an integer.
Go back and update your function to return the age as an integer. Will your function always return a value? Make sure your return type accurately reflects this. Call the function and print the return value.
func checkage(age: String)->Int?
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}

Answers

Answer and Explanation:

Here the programming language swift is being used. There is a slight error in the program shown above:

var userInputAge=9

func checkage(age: String)->int?

{

if let age_type = Int(age)

{

if age_type > 18 {

return "Welcome!"

}

else if age_type < 18 {

return"Sorry, but you aren't old enough to use our app."

}

}

else {

return "Sorry, something went wrong. Can you please re-enter your age?"

}

return age_type

}

The program should be revised :

func checkage(age: int?)->String

{

if let age_type = Int(age)

{

if age_type > 18 {

return "Welcome!"

}

else if age_type < 18 {

return"Sorry, but you aren't old enough to use our app."

}

}

else {

return "Sorry, something went wrong. Can you please re-enter your age?"

}

return age_type

}

We call the functions :

checkage(userInputAge)

checkage("15")

Note: we revised the program for errors in the first line of the code where the int optional parameter(int?) was supposed to be used instead of the String parameter in the function. We then called the function using the userInputAge variable defined as the parameter and then we now also used a String as the parameter for calling the function the second time.

Answer:

def checkage(age: "String")->int:

   if age >= 18:

       return "Welcome!"

   return "Sorry, but you aren't old enough to use our app."

   

for _ in iter(list,0):

   myage = int(input("Please enter your age: "))

   if myage is int(myage):

       result = checkage(myage)

       print(result)

       break

   print("Sorry, something went wrong. Enter integer value as age.")

   

Explanation:

The python code above lets the user input the age value for continuous comparison. If the age is an integer, it checks to know if the age is greater than 18 or not. If yes, it returns "Welcome!" else "Sorry, but you aren't old enough to use our app". But if the age is not an integer, it displays the message "Sorry, something went wrong. Can you please re-enter your age?" then prompts the user again for the age.

Note: the ': "String" ' and "->int" is for documentation purposes. They are used to describe the type of parameters (for later) and return value (the former).

Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer

Answers

The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.

In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.

The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.

On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.

The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.

Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.

For more questions on Reviewer, click on:

https://brainly.com/question/30517194

#SPJ8

When would it be necessary to edit the information shown on an electronic business card?

Answers

Answer:

It's D dear

Explanation:

Answer:

D. to show only relevant information to people inside your organization

Explanation:

hope this helps :)

A program that will ring a bell six times is what kind of program?
A. Edited
B. Iterative
C. Selection
D. Sequence

Answers

Answer:

D

Explanation:

because it is a sequence it does more than one thing

Answer:

B

Explanation:

I took the test

What is the first step a user should take toward generating an index?

--finding and marking words or phrases that should be included in the index
--making sure that headers at different levels are using consistent styles
--bolding every word or phrase that should be included in the index
--writing down information about the author and publisher of other books used

Answers

Answer:

I think that it's A

Explanation:

Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to a file, and then write the second program so that it reads the data from this file. However this process can be difficult and time consuming, especially if you don't know how to program in C# or C++. What feature of the UNIX/Linux shell can you use to simplify the process of sharing data between programs?

Answers

Certain ways exist to simplify the process of data sharing between programs.some of these ways are;

A) When there are two programs that are not running at the same time,then the pipes or the sockets won't be able to work as their buffers would not be able to hold large files because they are small.

Looking at this scenerio,shared memory can be used.

The Sysv IPC shared memory API, POSIX shared the memory API or rather files on a tmpfs system of files can actually be used for shared memory operations.

B) Another possible solution can be named file. Instead of using an unnamed and shell pipeline,a name pipeline them uses the file system.

However,it can be treated with the use of mkfifo() or mknod() commands and then two separate programs or also processes can as well access the pipe by making use of the name of the pipe.

But one process(program) can actually open the pipe but as a reader for reading purposes and the other for writing purposes as a writer.

PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?

Answers

Answer:

Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.

Crowdsourcing is not only used for relatively simple tasks such as designing a Web site or designing a case for a smartphone. Today, it is increasingly being used in more complex designs as well. Precyse Technologies provides supply-chain products and solutions that assist organizations in tracking their inventories using RFID technology. It was having difficulty improving the performance and battery life of a particular RFID device; there were not adequate internal resources to tackle the problem. So, Precyse asked InnoCentive, a crowdsourcing provider, for assistance, believing that crowdsourcing would provide quick access to a worldwide talent pool and a higher return on investment (ROI). Ultimately, the company received more than 300 ideas from global experts for solving its problem. It narrowed the pool down to three finalists, from which a winner was chosen. The whole process took approximately four months, and Precyse estimated that it saved the company $250,000. 1. What are some typical applications of crowdsourcing? 2. What are some advantages of crowdsourcing? 3. How could crowdsourcing reduce the systems design cost and are there certain problems you would not want to use crowdsourcing to solve?

Answers

1) SOME APPLICATIONS OF CROWD SOURCING ARE;

- MARKETING STRATEGY; There is finalizing of marketing strategies by firms and this is based on the crowd sourcing ideas.

- THOUGHT LEADERSHIP; There has been catering to crowdsourcing for high level thought leadership by many firms and this is done in various fields such as Human resources.

- DESIGNING; Designing is very common for crowdsourcing and this is seen where a bunch of talent pool is being used for the purpose of designing websites,applications and as well as other prototypes.

SOME OF THE ADVANTAGES OF CROWDSOURCING ARE;

- An individual can actually save lots of costs,this is because they don't need to hire a permanent resource and this resource can be quite expensive.

- Another advantage of crowdsourcing is that one can actually get services and idea from pool of professionals that are far talented across the world.

- It also play a role in obtaining of ideas from a group of people and this can go a way in shortening the resolution process, therefore saving time.

CROWDSOURCING HELPS IN GETTING IDEAS AND SERVICES FROM A WIDER POOL OF PROFESSIONALS THAT ARE TALENTED,So;

Lots of time are being saved when there is actually a large talent pool.

This then translates into shorter span in the system design process and it also results in the saving of costs.

However,a firm don't necessarily need to hire permanent resources for critical inputs I'm the design process and this also results in saving of costs s well.

People are known to be using Crowdsourcing. The applications of crowdsourcing is often done so as to gather information or work product.

This helps to gather or seeks money to aid individuals, charities, or for one to start a business. The advantages of crowdsourcing are cost savings, speed, etc.

Crowdsourcing is known to help man to remove the various costs due to  functioning as a pay-per-task model.

A well managed crowdsourcing can be used to pay workforce.

Learn more about Crowdsourcing from

https://brainly.com/question/6983872

anyone know how to fix black screen of death on computer​

Answers

Answer:

you asked a question so you must have fixed it

Explanation:

logic

What is the purpose of a poster frame?
to allow the contents of an embed code to be displayed
to insert a downloaded video for offline playback and editing
to create the frame in which a screen recording will be inserted
to capture a portion of a video clip to show as a preview image

Answers

Answer: the last one

Explanation:

Here is the answer::

The string expression strVar.____________________ starts at index pos, replaces the next n characters of strVar with all the characters of str.

Answers

Answer:

strVar.replace(pos, n, str);

Explanation:

The strVar.replace() is a javascript function of searching and replacing a string for a defined value, whereby it finds and returns a new string where the defined values are replaced.

For example: to return a string where "Trump" is replaced with "Biden":

We have

var str = "Welcome Trump!";

var res = str.replace("Trump", "Biden", str);

Hence, in this case, the correct answer is strVar.replace(pos, n, str);

Your personal opinion about what a "successful" console in the future will need to include to sell well. How have the changes in technology, gaming culture, and overall society affected the market?

Answers

Answer:

The answer is below

Explanation:

In my personal opinion what a "successful" console in the future will need to include to sell well is "a big library of games." This feature will help a console supports many games that will appeal to all categories of gamers.

The changes in technology, gaming culture, and overall society has affected the game market in many ways such as:

1. In terms of technology: it has made the game manufacturers both the console and third-party game developers to improve their gaming features. For example, the advancement in gaming pads becoming wireless. The gaming console having internet or online features, where gamers can play with each other around the world from their rooms. Also, the gaming character design looking more and more like the real-life personality it represents.

2. In terms of gaming culture: modern games are no longer for teenagers alone. It is now appealing to adults as well. This is evident in football players and coaches playing the games and talking about it. Even some players tend to influence their ratings in the game by mentioning how good they are in the press in comparison to the rating game developers are giving them.

3. Overall society has now seen gaming consoles as part of everyday life. The parents, researchers, and even feminist groups are now well aware of the gaming industry. And each of the stakeholders involved is influenced by how the game consoles manufacturers market their games through media, sports personalities, celebrities, etc.

Internet routing:_________. A. precomputes the most efficient route and uses it to ensure rapid packet delivery. B. broadcasts all packets to all hosts so the recipient will be sure to see its traffic. C. makes routing decisions one at a time as a packet crosses individual networks. D. uses port numbers to optimize the transmission of streaming media.

Answers

Answer:

A. precomputes the most efficient route and uses it to ensure rapid packet delivery.

Explanation:

In simple words, what Internet routing means is a process where a router decides which path data packets should follow that are more efficient in delivering the packets across computers.

For example, we can liken the process to the duties of a tour guide in a museum or large building in directing visiting guests who came to explore the museum.

you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?

Answers

Answer:

Do not use such labels because they may be misleading and are unethical.

Explanation:

Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.

While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.

Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.

There are different instructions that comes with labeling, lithium metal label  is quite different from Lithium-ion labels and as such one cannot use one for the order.

What one should you do is to never use the lithium metal labels in place of  Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.

One has to comply with the regulations regarding batteries and the packaging of lithium batteries.

Lithium Metal Batteries  are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.

They have high energy density than other lithium batteries.   They can be found in Watches , Calculators etc.

Lithium-ion batteries are known to be  secondary battery. That is, they are said to be rechargeable in nature. They can be found  in Mobile phones, Laptops etc.

When shipped, any packages that has lithium-ion batteries must be labeled with  UN3480  or UN3481.

When shipped, any packages that has lithium metal batteries must be labeled  with UN3090  or UN3091.

Learn more about Batteries from

https://brainly.com/question/24876978

Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely. Give three specific example pairs of Internet entities that may want secure communication.

Answers

Answer: See explanation

Explanation:

A secure connection simply means when there's encryption of a connection through the use of security protocols so that data flowing between the nodew can be secured.

Examples of Internet entities that may want secure communication include:

i. Two routers

ii. Our laptop and web server.

iii. Connection that exists between two DNS name servers.

Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm that is used to place processes of size 115 KB, 500 KB, 358 KB, 200 KB, and 375 KB in the following order is the _______________.

Answers

Answer:

The memory allocation algorithm that is used to place the processes given is the First Fit Algorithm

Explanation:

The First Fit Management Algorithm works by ensuring that the pointer keeps track of all the free spaces in the memory and accepts and executes all instructions to allocate a memory block to the coming process as long as it is big enough to hold the size of the process.

For example, the First Fit algorithm will allocate the processes in the first block that fits (that is, if it can fit the memory bock in the queue, then the process will be store)

It will work as follows (recall that the memory partitions are in order and must remain so):

A) 115 KB is stored in 300KB block, leaving the following free spaces (185KB, 600KB, 350KB, 200KB, 750KB, 125KB), next

B) 500 KB is store in a 600KB block leaving the following free spaces (185 KB, 100  KB, 350 KB, 200 KB, 750 KB, 125 KB), next  

C) 358 KB is stored in 750KB block, leaving the following free spaces (185KB, 100KB, 350KB, 200KB, 392KB, 125KB)  next

D) 200 KB is stored in 350KB block, leaving the following free spaces (185 KB, 100 KB, 150KB, 200KB, 392KB, 125KB)  next

E) 375KB is stored in 392KB block leaving (185KB, 100KB, 150KB,  200KB, 17KB, 125KB)

One of the demerits of this Algorithm is that, as shown above, memory is not maximized. It however is one of the easiest algorithms amongst all the other memory allocation processes.

Cheers

For python, Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2

Answers

import math

def getResults(r):

   return "Volume = {}\nSurface Area = {}".format(round((4/3)*math.pi*(r**3),1), round((4*math.pi)*(r**2),1))

print(getResults(3.5))

I hope this helps!

____________________________ and _________________________ are 2 negative impacts of the internet on businesses.

A)Unlimited Availability and Low Confidence in the business


B)Competition and Poor Impersonality


C)Competition and Unlimited Availability


D)Low Confidence in the business and Improved Communication

Answers

Answer:

i no you its me remember and the answer is b.

Explanation:

In the rapid application development (RAD) model, the _____ phase focuses on program and application development tasks similar to the SDLC.A) requirements planningB) user designC) constructionD) cutover

Answers

Answer:

C) construction

Explanation:

Rapid application development abbreviated RAD is an agile software development strategy that reduces time spent on planning so that prototype development takes priority and project turnaround time is greatly reduced consequently. There are four phases in rapid application development :

requirements planning, user design, construction, cutover

The construction phase is the third stage in rapid application development. This stage builds on the progress of the previous stages- the requirements planning stage and user design stage- to go ahead to finalize the application development which has been agreed on through iterations and communication between developer and client in the user design stage. In other words, this stage basically takes the ideas, prototypes and beta products from the previous stages and makes it into a real final product. The rationale or perks behind this is that other problems such as what product would do or look like or any changes or modifications have been worked out in previous stages thereby speeding up development in this stage.

Help Quick Please!!!!

Ann sent out a business letter three weeks ago, hoping to increase sales. However, she has not seen an increase. She thinks that making the communication more impressive will increase the business. Ann should _____.

Answers

Ann should make flyers and but then put in local spots where lots of people go

if there was no technological advancement what would be our society like​

Answers

Answer:

WHAT SOCIETY?!

Every night we'd still be squatting in caves, hunched around campfires, waiting for the leopards to pick us off....

It's hard to have a society when your means of communication are nearly zero and therefore can't sustain the dialogue necessary to develop the shared values needed to form a society.

The art element line is a moving point.


True or False

Answers

i’m pretty sure the answer is true

Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable? Draw a picture to illustrate your network and where each type of delay occurs.

Answers

List the delay components in the end-to-end delay:
Processing delay
Transmission delay
Propagation delay
Queuing delay.
The processing delay, transmission delay, and propagation delay are constant. Reason is that, time taken to transmit data bits.
The queuing delay is variable.Reason is that, Only single packet transfer in queue process and waiting time depends on packet size.

The delay components in the end-to-end delay are processing delay, Transmission delay, Propagation delay, and Queuing delay.

What is an end-to-end Delay?

End-to-end delay, also known as one-way delay, is the length of time it takes for a packet to go from its source to its destination across a network. It is a word frequently used in the monitoring of IP networks, and it varies from round-trip time in that only the path from source to destination is measured.

Now according to the question, the propagation, transmission, and processing delays are all constant. The time required to send data bits is the cause.

Variable queuing delays exist.

The waiting time is dependent on packet size, and only one packet can be transferred at a time in the queue process.

To get more information about End-to-End delay :

https://brainly.com/question/28584250

#SPJ2

Which of these can be sorted with a bubble sort?

['red', 'blue', 'green', 7]

{41:5,32:10, 20: 234}

​[7, 10, 2.5, 1.566]

[1, 2.5, 'book']

Answers

C because a bubble sort only compares numbers

Answer:

C

Explanation:

ed 2021

13 List five examples of functionality that can be added when using express
cards?

Answers

Answer:

This Answer Was Pasted Over From ayushisingh5

Explanation:

ExpressCards can connect a variety of devices to a computer including mobile broadband modems (sometimes called connect cards), IEEE 1394 (FireWire) connectors, USB connectors, Ethernet network ports, Serial ATA storage devices, solid-state drives, external enclosures for desktop-size PCI Express graphics cards and ...

What is the most effective way to identify improvement opportunities for value log

Answers

Answer:

Performance Improvement (PI) Champion performs Value Stream Mapping and identifies improvement opportunities

Explanation:

Performance Improvement (PI) Champion performs Value Stream Mapping and identifies improvement opportunities.

In other words, Value stream mapping is a strategy that is used to break down situations into pieces such as people, information, and materials involved in delivering services.

To do this, a distinct categorization is made into a value-adding category and a non-value-adding category. This helps to determine which elements add value to customers or not.

Thereby, removing unnecessary processes or steps which in turn increases productivity and value.

Using a for loop, write a function lastfirst() that takes a list of strings as a parameter. Each string in the list has the format 'Last, First' where Last is a last name and First is a first name. You should assume that there are no spaces between the last name and the comma and that there are an arbitrary number of spaces between the comma and the first name. The function lastfirst() returns a list containing two sub lists. The first sub list is a list of all the first names and the second sub list is a list of all the last names. The following shows how the function would be called on two example parameters:>>> lastfirst(['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])[['Evelyn', 'Tom', 'Elvis', 'Gordon'], ['Lulis', 'Jones', 'Presley', 'Sumner']]>>> lastfirst(['Ford, Harrison', 'Hepburn, Katharine', 'Tracy, Spencer'])[['Harrison', 'Katharine', 'Spencer'], ['Ford', 'Hepburn', 'Tracy']]

Answers

def lastfirst(lst):

   newlst = []

   newlst1=[]

   for x in lst:

       w = x.split(",")

       newlst.append(w[1].strip())

       newlst1.append(w[0].strip())

   newlst2 = [newlst], [newlst1]

   return newlst2

lst1 = (['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])

print(lastfirst(lst1))

I hope this helps!

Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade point average. The user will type in input containing the student's name, then a number of scores, followed by that many integer scores. Then, the method will print out the average of all grades entered. Here are two example dialogues: Enter a student name: Maria Enter the number of courses: 5 Course 1 Grade: 72 Course 2 Grade: 91 Course 3 Grade: 84 Course 4 Grade: 89 Course 5 Grade: 78 Maria's grade is 82.8 Enter a student name: Jordan Enter the number of courses: 4 Course 1 Grade: 86 Course 2 Grade: 71 Course 3 Grade: 62 Course 4 Grade: 90 Jordan's grade is 77.25

Answers

import java.util.Scanner;

public class JavaApplication40 {

   public static  void printGPA(Scanner scan){

       System.out.println("Enter a student name:");

       String name = scan.nextLine();

       System.out.println("Enter the number of courses:");

       int courses = scan.nextInt();

       double total = 0;

       for (int i = 1; i <= courses; i++){

           System.out.println("Course "+i+" Grade:");

           double grade = scan.nextDouble();

           total += grade;

       }

       System.out.println(name+"'s grade is "+(total/courses));

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       printGPA(scan);

   }

   

}

I hope this helps!

Other Questions
Bailey has 8 pears.Each pear weighs1/4 pound. Howmany ounces ofpears does Baileyhave? galio was tired of heresey because he said that? 3(x + y) + 2x2 + (1 + y)? ALL THE WEIRD STUFF I POSTED EVERYONE IS A JOKE JUST WANTED TO SEE HOW U RESPONDED help please thank you sm Escribe un comportamiento defensivo de algunas especies. This is the last question on my DBA! Please help!!What are the key features of the graph's exponential functions? Explain how you find each keyfeature and what happens to the graphs if you were to add or subtract a constant term. How can you tell a triangle is similar with having only one side number? PLEASEE HELP.!! ILL GIVE BRAINLIEST.!! *EXTRA POINTS* DONT SKIP:(( Plz i need an accurate answer help me plz. Choices --6 or 6 Chemistry of Life Practice Active 8 1 What type of organic compound is used for building cell parts? What does the Bill of Rights list, and why was it an important part of getting the Constitution approved? (Site 1) What do you call the pairs of roots of quadraticequation with complex solutions?Math Please answer number 1? Thank you How would you say I watch in Spanish in a way that fits into this crossword What two options are homogeneous mixture The Idol's Eye diamond weighs 79.2 carats.The Blue Hope diamond weighs 33.68 carats less than the Idol's Eye.What is the weight of the Blue Hope diamond? HelpppColonists believed they needed tobe represented in the decision onwhether or not they wanted Where did Martin Luther King Jr. deliver his speech I have a dream